Introduction to machine learning with applications in information security / (Record no. 63935)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03089dam a22003138i 4500 |
001 - CONTROL NUMBER | |
control field | 0000372281 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | 0001 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221215s2023 flu b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2022007073 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781032204925 (hardback) |
Qualifying information | (hbk) |
International Standard Book Number | 9781032207179 |
Qualifying information | (pbk) |
Canceled/invalid ISBN | 9781003264873 |
Qualifying information | (ebk) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | DLC |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | DLC |
042 ## - AUTHENTICATION CODE | |
Authentication code | pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23/eng/20220223 |
084 ## - OTHER CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | STA-I |
Number source | 23/eng/20220223 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stamp, Mark, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Introduction to machine learning with applications in information security / |
Medium | Book / |
Statement of responsibility, etc. | Mark Stamp. |
250 ## - EDITION STATEMENT | |
Edition statement | Second edition. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiv, 534 pages : |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price type code | 01 |
Price amount | 12,502.18 |
490 0# - SERIES STATEMENT | |
Series statement | Chapman & Hall/CRC machine learning & pattern recognition |
500 ## - GENERAL NOTE | |
General note | Includes bibliography and index |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "Introduction to Machine Learning with Applications in Information Security, Second Edition provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, reinforced via realistic applications. The book is accessible and doesn't prove theorems, or dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core classic machine learning topics in depth, including Hidden Markov Models (HMM), Support Vector Machines (SVM), and clustering. Additional machine learning topics include k-Nearest Neighbor (k-NN), boosting, Random Forests, and Linear Discriminant Analysis (LDA). The fundamental deep learning topics of backpropagation, Convolutional Neural Networks (CNN), Multilayer Perceptrons (MLP), and Recurrent Neural Networks (RNN) are covered in depth. A broad range of advanced deep learning architectures are also presented, including Long Short-Term Memory (LSTM), Generative Adversarial Networks (GAN), Extreme Learning Machines (ELM), Residual Networks (ResNet), Deep Belief Networks (DBN), Bidirectional Encoder Representations from Transformers (BERT), and Word2Vec. Finally, several cutting-edge deep learning topics are discussed, including dropout regularization, attention, explainability, and adversarial attacks. Most of the examples in the book are drawn from the field of information security, with many of the machine learning and deep learning applications focused on malware. The applications presented serve to demystify the topics by illustrating the use of various learning techniques in straightforward scenarios. Some of the exercises in this book require programming, and elementary computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of computing experience should have no trouble with this aspect of the book"-- |
Assigning source | Provided by publisher. |
521 ## - TARGET AUDIENCE NOTE | |
Target audience note | All. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information networks |
General subdivision | Security measures. |
Topical term or geographic name entry element | Machine learning. |
852 ## - LOCATION | |
Accession No. | 10001000062878 |
-- | 12502.18 |
-- | Book World International |
Former shelving location | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Junaid Zaidi Library, COMSATS University Islamabad | Junaid Zaidi Library, COMSATS University Islamabad | 09/09/2023 | 005.8 STA-I 62878 | 10001000062878 | 09/09/2023 | 09/09/2023 | Books |